UM
(Note: the search results are based on claimed items)

Browse/Search Results:  1-3 of 3 Help

Filters                                
Selected(0)Clear Items/Page:    Sort:
Two strategies to optimize the decisions in signature verification with the presence of spoofing attacks Journal article
Information Sciences, 2016,Volume: 352-353,Page: 188-202
Authors:  Yu S.;  Ai Y.;  Xu B.;  Zhou Y.;  Li W.;  Liao Q.;  Poh N.
Favorite |  | TC[WOS]:4 TC[Scopus]:5 | Submit date:2018/12/21
Biometric Authentication  Brute-force  Liveness Score  Probabilistic  Spoofing Attack  
2D Sudoku associated bijections for image scrambling Journal article
Information Sciences, 2016,Volume: 327,Page: 91-109
Authors:  Wu Y.;  Zhou Y.;  Agaian S.;  Noonan J.P.
Favorite |  | TC[WOS]:14 TC[Scopus]:17 | Submit date:2018/12/21
Image Scrambling  Matrix Element Representation  Sudoku Matrix  Two Dimensional Bijection  
Image encryption using 2D Logistic-adjusted-Sine map Journal article
Information Sciences, 2016,Volume: 339,Page: 237
Authors:  Hua Z.;  Zhou Y.
Favorite |  | TC[WOS]:273 TC[Scopus]:305 | Submit date:2018/10/30
Chaotic Encryption  Chaotic Map  Confusion And Diffusion  Image Encryption